Advertisement

Matrix Embedding Using Random Linear Codes and Its Steganalysis

  • P. Harmya
  • S. S. Anju
  • Noopa Jagadeesh
  • Aishwarya Nandakumar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 192)

Abstract

To improve embedding efficiency, one of the most important steganographic scheme isMatrix embedding, otherwise known as syndrome coding. The schemes that employ matrix embedding is generally more secure because it brings about lower embedding changes.. In this paper matrix embedding scheme based on random linear codes of small dimension is considered. It is suitable for large payloads which makes it appropriate for practical applications. This scheme is efficient for embedding messages close to the embedding capacity. This scheme not only provides high embedding capacity but also enhances the quality of the stego image. The method is proved to withstand attacks like Chi-square and RS steganalysis.

Keywords

Steganography Binary Linear Codes Matrix Embedding Chisquare RS steganalysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fridrich, J., Soukal, D.: Matrix Embedding for large payloads. IEEE Transactions on Information, Security and Forensics 1(3), 390–395 (2006)CrossRefGoogle Scholar
  2. 2.
    Wu, D.C., Tsai, W.H.: A Steganographic Method for Images By Pixel Value Differencing. Pattern Recognition Letters 24, 1613–1626 (2003)CrossRefzbMATHGoogle Scholar
  3. 3.
    Williams, F.J.M., Sloane, N.J.: The Theory of Error-correcting Codes. North-Holland, Amsterdam (1997)Google Scholar
  4. 4.
    Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proc. ITW 2003, pp. 151–154 (2003)Google Scholar
  5. 5.
    Bierbrauer, J., Fridrich, J.: Constructing Good Covering Codes for Applications in Steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  6. 6.
    Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675, pp. 1–13 (January 2002)Google Scholar
  7. 7.
    Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proc. ACM Workshop on Multimedia and Security, Ottawa, Canada, pp. 27–30 (2001)Google Scholar
  8. 8.
    Westfeld, A., Pfitzmann, A.: Attacks, on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools–and Some Lessons Learned. In: 3rd International Workshop on Information Hiding (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • P. Harmya
    • 1
  • S. S. Anju
    • 1
  • Noopa Jagadeesh
    • 1
  • Aishwarya Nandakumar
    • 1
  1. 1.Centre For Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations